2023
DOI: 10.3390/jtaer18040096
|View full text |Cite
|
Sign up to set email alerts
|

User-Informed Adaptation in IoT Home Healthcare: Grounding Development in Empirical Evidence

Hannah Fehringer,
Christian Stary

Abstract: IoT (Internet of Things)-enabled products are increasingly used by consumers and continuously propagate in daily life. Billions of networked objects not only increase the complexity of development but also raise user interaction and adaptation to individual needs. The more non-expert users are involved in decision making, interaction, and adaptation processes, the more user-centric IoT design is crucial, particularly when the number of elderly users is steadily increasing. In this paper, we study the capabilit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 42 publications
0
1
0
Order By: Relevance
“…The potential applications of IoT encompass a wide and diverse range of fields, and its impact is manifested in various industries, such as tourism [6], home healthcare [7], agriculture [8,9], and finance [10], among others. As the number of devices connected to the global network continues to grow, it has raised new concerns regarding security, stemming from the vulnerabilities presented by IoT devices, such as authentication, access control, device security, and heterogeneity, among others [2,[11][12][13].…”
Section: Introductionmentioning
confidence: 99%
“…The potential applications of IoT encompass a wide and diverse range of fields, and its impact is manifested in various industries, such as tourism [6], home healthcare [7], agriculture [8,9], and finance [10], among others. As the number of devices connected to the global network continues to grow, it has raised new concerns regarding security, stemming from the vulnerabilities presented by IoT devices, such as authentication, access control, device security, and heterogeneity, among others [2,[11][12][13].…”
Section: Introductionmentioning
confidence: 99%